{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T03:38:03Z","timestamp":1778297883079,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540649519","type":"print"},{"value":"9783540539186","type":"electronic"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055477","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T09:10:06Z","timestamp":1153991406000},"page":"122-140","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["A formal specification of requirements for payment transactions in the SET protocol"],"prefix":"10.1007","author":[{"given":"Catherine","family":"Meadows","sequence":"first","affiliation":[]},{"given":"Paul","family":"Syverson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"M. Burrows, M. Abadi, and R. Needham, A Logic of Authentication, SRC Research Report 39, Digital Systems Research Center, February 1989.","DOI":"10.1145\/74850.74852"},{"key":"9_CR2","first-page":"133","volume-title":"Towards the Formal Verification of Electronic Commerce Protocols","author":"D. Bolignano","year":"1997","unstructured":"D. Bolignano, \u201cTowards the Formal Verification of Electronic Commerce Protocols\u201d, Proceedings of the 10\n                \n                  th\n                \n                IEEE Computer Security Foundations Workshop, pp. 133\u2013146, Rockport Massachusetts, IEEE CS Press, June 1997."},{"key":"9_CR3","volume-title":"Automatic Formal Analyses of Two Large Commercial Protocols","author":"S. Brackin","year":"1997","unstructured":"S. Brackin, \u201cAutomatic Formal Analyses of Two Large Commercial Protocols\u201d, DIM ACS Workshop on Design and Formal Verification of Security Protocols, Rutgers New Jersey, September 1997. (Paper available at http:\/\/dimacs.rutgers.edu\/Workshops\/Security\/program2\/brackin.html)"},{"key":"9_CR4","first-page":"234","volume-title":"Reasoning about Belief in Cryptographic Protocols","author":"L. Gong","year":"1990","unstructured":"L. Gong, R. Needham, and R. Yahalom, \u201cReasoning about Belief in Cryptographic Protocols\u201d, Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 234\u2013248, IEEE Computer Society Press, Oakland California, May 1990."},{"key":"9_CR5","unstructured":"SET Secure Electronic Transaction Specification, Version 1.0, May 1997. (Downloaded from http:\/\/www.visa.com\/set\/)"},{"key":"9_CR6","doi-asserted-by":"crossref","first-page":"165","DOI":"10.21236\/ADA463014","volume-title":"A Logical Language for Specifying Cryptographic Protocol Requirements","author":"P. Syverson","year":"1993","unstructured":"P. Syverson and C. Meadows, \u201cA Logical Language for Specifying Cryptographic Protocol Requirements\u201d, Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 165\u2013177, IEEE Computer Society Press, Oakland California, May 1993."},{"key":"9_CR7","first-page":"320","volume-title":"LNCS vol. 950","author":"P. Syverson","year":"1994","unstructured":"P. Syverson and C. Meadows, \u201cFormal Requirements for Key Distribution Protocols\u201d, Advances in Cryptology \u2014 EUROCRYPT '94, LNCS vol. 950, A. De Santis, ed., pp. 320\u2013331, Springer-Verlag, Perugia Italy, 1994."},{"issue":"1","key":"9_CR8","first-page":"27","volume":"7","author":"P. Syverson","year":"1996","unstructured":"P. Syverson and C. Meadows, \u201cA Formal Language for Cryptographic Protocol Requirements\u201d, Designs, Codes, and Cryptography, vol. 7, nos. 1 and 2, pp. 27\u201359, January 1996.","journal-title":"Designs, Codes, and Cryptography"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055477","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T13:16:01Z","timestamp":1558271761000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055477"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540649519","9783540539186"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/bfb0055477","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1998]]},"assertion":[{"value":"28 May 2006","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}